<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I verify Threat Emulation is working? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76675#M13466</link>
    <description>&lt;P&gt;Is it compulsory to enable https inspection and MTA for Threat emulation blade? If I enable threat emulation like inline mode than does it scan files downloaded from websites?&lt;/P&gt;</description>
    <pubDate>Fri, 28 Feb 2020 11:50:45 GMT</pubDate>
    <dc:creator>Gaurav_Pandya</dc:creator>
    <dc:date>2020-02-28T11:50:45Z</dc:date>
    <item>
      <title>How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48195#M13454</link>
      <description>&lt;P&gt;We offer a test you can access from behind your Security Gateway where Threat Emulation is enabled to ensure it is working:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://poc-files.threat-cloud.com/demo/demo.doc" target="_blank" rel="noopener"&gt;Threat Emulation Test&lt;/A&gt; -- A link to a DOC with an exploit that will not harm your computer. Will show as Exploited Document in logs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Related:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://www.eicar.org/download/eicar_com.zip" target="_blank" rel="noopener"&gt;Anti-Virus Test&lt;/A&gt;&amp;nbsp;-- Downloads the standard &lt;A href="http://www.eicar.org/" target="_blank" rel="noopener"&gt;EICAR&lt;/A&gt; AV test file&lt;/LI&gt;
&lt;LI&gt;&lt;A href="http://sc1.checkpoint.com/za/images/threatwiki/pages/TestAntiBotBlade.html" target="_blank" rel="noopener"&gt;Anti-Bot Test&lt;/A&gt;&amp;nbsp;-- Accesses a link that is flagged by Anti-Bot blade as malicious. Shows as Check Point-Testing Bot in logs.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 22 Mar 2019 03:06:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48195#M13454</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T03:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48267#M13455</link>
      <description>&lt;P&gt;Thanks for the test tip, Dameon!&lt;/P&gt;&lt;P&gt;Also CP's CheckMe is a good option for this &lt;A href="http://www.cpcheckme.com/checkme/" target="_self"&gt;http://www.cpcheckme.com/checkme/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 13:06:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48267#M13455</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2019-03-22T13:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48276#M13456</link>
      <description>Also a good test.</description>
      <pubDate>Fri, 22 Mar 2019 13:19:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/48276#M13456</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T13:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63784#M13457</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I' m checking the checkpoint ICAP server on my lab and if I upload a eicar document, the checkpoint accept the eicar file.&lt;/P&gt;&lt;P&gt;I configured a ICAP profil ont the threat prevention layer with this options.&lt;/P&gt;&lt;P&gt;- If the threat emulation is activate ont the ICAP profil, the eicar test file is accept by checkpoint&lt;/P&gt;&lt;P&gt;-If I the threat emulation is not activate on the ICAP profil the eicar test document is prevent by the anti-virus blade&amp;nbsp; as shown as the attached picture.&lt;/P&gt;&lt;P&gt;I don't underand how it's works..&lt;/P&gt;&lt;P&gt;If someone can explain me the difference ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Miguel&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 09:33:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63784#M13457</guid>
      <dc:creator>chico</dc:creator>
      <dc:date>2019-09-27T09:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63808#M13458</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28106"&gt;@miguel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think that the explanation is on the behavior analytic engine of Sandblast, same happens with antivirus such as Cylance: EICAR is not being detected because it actually does nothing on your system. In other words it doesn't trigger any indicator of compromise.&lt;/P&gt;&lt;P&gt;I would recommend you try these solutins with real malware from The Zoo Project (&lt;A href="https://github.com/ytisf/theZoo" target="_self"&gt;https://github.com/ytisf/theZoo&lt;/A&gt;) if you want to go beyond you can even modify the binaries so the hash is new.&lt;/P&gt;&lt;P&gt;Handle with care since it's real malwre &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 12:22:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63808#M13458</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-09-27T12:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63833#M13459</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks you for reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ha yes I understood, in the threat emulation, the document is emulated in various OS systems to check if there are abnormal behaviors. Effectively ICAR doesn't do anything it's a simply signature...so it's detected by the anti-virus signature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the link.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 13:34:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/63833#M13459</guid>
      <dc:creator>chico</dc:creator>
      <dc:date>2019-09-27T13:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75920#M13460</link>
      <description>Hi,&lt;BR /&gt;The link to the Threat Emulation test file is now working. Was the path changed?&lt;BR /&gt;&lt;A href="http://poc-files.threat-cloud.com/demo/demo.doc" target="_blank"&gt;http://poc-files.threat-cloud.com/demo/demo.doc&lt;/A&gt;</description>
      <pubDate>Thu, 20 Feb 2020 16:35:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75920#M13460</guid>
      <dc:creator>Herold</dc:creator>
      <dc:date>2020-02-20T16:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75942#M13461</link>
      <description>Looks like the same path I provided above?</description>
      <pubDate>Thu, 20 Feb 2020 20:32:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75942#M13461</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-20T20:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75957#M13462</link>
      <description>Yes, it's exactly the one you provided. But it seems it doesn't work as i'm getting an "internal server error" when i click on it. Is there another link?</description>
      <pubDate>Thu, 20 Feb 2020 23:14:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75957#M13462</guid>
      <dc:creator>Herold</dc:creator>
      <dc:date>2020-02-20T23:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75961#M13463</link>
      <description>Not as far as I know.&lt;BR /&gt;I checked the link and it appears to be working for me.</description>
      <pubDate>Fri, 21 Feb 2020 01:47:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/75961#M13463</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-21T01:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76016#M13464</link>
      <description>When I tried, i get the following message: "Sorry, the page you are looking for is currently unavailable.&lt;BR /&gt;Please try again later.&lt;BR /&gt;If you are the system administrator of this resource then you should check the error log for&lt;BR /&gt;details.&lt;BR /&gt;Faithfully yours, nginx."</description>
      <pubDate>Fri, 21 Feb 2020 17:06:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76016#M13464</guid>
      <dc:creator>Herold</dc:creator>
      <dc:date>2020-02-21T17:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76017#M13465</link>
      <description>Hm... you're right.&lt;BR /&gt;I see that when I try from a system that isn't connected to our VPN that it fails.&lt;BR /&gt;I've reported it internally...should get fixed soon.</description>
      <pubDate>Fri, 21 Feb 2020 18:53:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76017#M13465</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-21T18:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76675#M13466</link>
      <description>&lt;P&gt;Is it compulsory to enable https inspection and MTA for Threat emulation blade? If I enable threat emulation like inline mode than does it scan files downloaded from websites?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 11:50:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76675#M13466</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-02-28T11:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76751#M13467</link>
      <description>It's not necessarily compulsory, but it's highly recommended.&lt;BR /&gt;With the majority of traffic being HTTPS and the browser manufacturers continuing to force the issue, without it, you'll be blind to more and more threats.&lt;BR /&gt;Threat Emulation can work inline--Threat Extraction can as well from R80.30.&lt;BR /&gt;For email, TLS is becoming more prevalent and the only way to scan email for threats is to run in MTA mode.</description>
      <pubDate>Fri, 28 Feb 2020 18:48:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76751#M13467</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-28T18:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do I verify Threat Emulation is working?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76860#M13468</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 14:31:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-do-I-verify-Threat-Emulation-is-working/m-p/76860#M13468</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-03-02T14:31:49Z</dc:date>
    </item>
  </channel>
</rss>

